William & Mary Law Review

Page created by Dan White
 
CONTINUE READING
William & Mary Law Review

Volume 62 (2020-2021)                                                                                      Article 2
Issue 6

5-2021

A New Compact for Sexual Privacy
Danielle Keats Citron

Follow this and additional works at: https://scholarship.law.wm.edu/wmlr

    Part of the Law and Society Commons, and the Privacy Law Commons

Repository Citation
Danielle Keats Citron, A New Compact for Sexual Privacy, 62 Wm. & Mary L. Rev. 1763 (2021),
https://scholarship.law.wm.edu/wmlr/vol62/iss6/2

Copyright c 2021 by the authors. This article is brought to you by the William & Mary Law School Scholarship
Repository.
https://scholarship.law.wm.edu/wmlr
William & Mary
                      Law Review
VOLUME 62                                                                   NO. 6, 2021

              A NEW COMPACT FOR SEXUAL PRIVACY

                          DANIELLE KEATS CITRON*

                                       ABSTRACT

   Intimate life is under constant surveillance. Firms track people’s
periods, hot flashes, abortions, sexual assaults, sex toy use, sexual
fantasies, and nude photos. Individuals hardly appreciate the extent
of the monitoring, and even if they did, little could be done to curtail

     * Jefferson Scholars Foundation Schenck Distinguished Professor in Law, University
of Virginia School of Law; Vice President, Cyber Civil Rights Initiative; 2019 MacArthur
Fellow. I am grateful to William & Mary Law School for inviting me to give the George Wythe
Lecture, to faculty and students for their thoughtful comments, and to the Law Review
(especially Geoffrey Cannon and his fellow editors) for superb suggestions. Ryan Calo,
Woodrow Hartzog, Mary Anne Franks, Neil Richards, Ari Waldman, Alan Butler, Sara Cable,
Kris Collins, Jennifer Daskal, John Davisson, Hany Farid, Ahmed Ghappour, Rebecca Green,
Debbie Hellman, Laura Heymann, Joe Jerome, Cameron Kerry, Ryan Kriger, Gary Lawson,
Tiffany Li, Linda McClain, Mike Meuer, Luis Alberto Montezuma, Jeanine Morris-Rush,
Nancy Moore, Nate Oman, David Rossman, Andrew Selbst, David Seipp, Kate Silbaugh,
Jessica Silbey, Noah Stein, Peter Swire, and David Webber provided helpful advice. Boston
University Journal of Science & Technology Law kindly asked me to present this paper as the
keynote of its 2019 data privacy symposium. Matt Atha, Rebecca Gutterman, Caroline
Hopland, and Julia Schur went above and beyond as research assistants. Tyler Gabrielski
was a constant help. The MacArthur Foundation graciously supported this work. I am
especially grateful to Dean Risa Goluboff and Vice Dean Leslie Kendrick of the University of
Virginia School of Law for their encouragement and insights.

                                          1763
1764                WILLIAM & MARY LAW REVIEW           [Vol. 62:1763

it. What is big business for firms is a big risk for individuals.
Corporate intimate surveillance undermines sexual privacy—the
social norms that manage access to, and information about, human
bodies, sex, sexuality, gender, and sexual and reproductive health. At
stake is sexual autonomy, self-expression, dignity, intimacy, and
equality. So are people’s jobs, housing, insurance, and other life
opportunities. Women and minorities shoulder a disproportionate
amount of that burden.
   Privacy law is failing us. Not only is the private sector’s handling
of intimate information largely unrestrained by American consumer
protection law, but it is treated as inevitable and valuable. This
Article offers a new compact for sexual privacy. Reform efforts should
focus on stemming the tidal wave of collection, restricting uses of
intimate data, and expanding the remedies available in court to
include orders to stop processing intimate data.
2021]                  A NEW COMPACT FOR SEXUAL PRIVACY                                        1765

                                   TABLE OF CONTENTS

INTRODUCTION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .         1766
I. UNDERSTANDING PRIVATE-SECTOR SURVEILLANCE OF
   INTIMATE LIFE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .       1773
   A. Cataloging First-Party Collection . . . . . . . . . . . . . . . . . .                    1773
      1. Our Bodies: Our Sexual and Reproductive
         Health . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .    1774
      2. Adult Sites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .       1778
      3. Dating Apps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .         1779
      4. Personal Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .          1782
   B. Surveying Third-Party Collection . . . . . . . . . . . . . . . . . .                     1785
      1. The Data Hand Off: Advertising and Analytics . . . . .                                1785
      2. Data Brokers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .         1788
      3. Cyber Stalking Apps. . . . . . . . . . . . . . . . . . . . . . . . . . .              1790
      4. Purveyors of Nonconsensual (Sometimes Fake)
        Porn . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   1791
II. ASSESSING THE DAMAGE AND LAW’S RESPONSE . . . . . . . . . .                                1792
   A. Undermining the Values Secured by Sexual
      Privacy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .    1792
   B. Surveying the Damage. . . . . . . . . . . . . . . . . . . . . . . . . . .                1800
   C. Understanding the Legal Landscape . . . . . . . . . . . . . . .                          1804
      1. Privacy Legislation. . . . . . . . . . . . . . . . . . . . . . . . . . . .            1804
      2. Privacy Policy Making of Law Enforcers . . . . . . . . . .                            1807
      3. Private Suits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .       1812
      4. Criminal Law . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .          1814
III. REIMAGINING PROTECTIONS FOR INTIMATE
     INFORMATION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .         1816
   A. Special Protections for Intimate Information . . . . . . . . .                           1817
      1. Limits on Collection . . . . . . . . . . . . . . . . . . . . . . . . . . .            1818
      2. Use Restrictions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .          1824
      3. Remedies: Halt Processing and the Data Death
        Penalty . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .    1826
   B. Objections. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .      1829
      1. Market. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .     1830
      2. Free Speech . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .       1831
CONCLUSION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .       1838
1766                      WILLIAM & MARY LAW REVIEW                        [Vol. 62:1763

                                    INTRODUCTION

   Intimate life is under constant surveillance. Apps memorialize
people’s menstruation cycles, fertility, and sexually transmitted
infections.1 Advertisers and analytics firms track searches and
browsing on adult sites.2 Sex toys monitor the frequency and inten-
sity of their owners’ use.3 Digital assistants record, transcribe, and
store conversations in bedrooms and bathrooms.4
   In some contexts, people enter into relationships with the firms
tracking their intimate lives.5 This is true when individuals sub-
scribe to dating apps or purchase digital assistants.6 In other
contexts, people have no connection with the firms handling their
intimate data. Data brokers, cyber stalking apps, and sites devoted
to nonconsensual pornography and deep fake sex videos come to
mind.7

     1. No Body’s Business but Mine: How Menstruation Apps Are Sharing Your Data, PRIV.
INT’L (Oct. 7, 2020), https://privacyinternational.org/long-read/3196/no-bodys-business-mine-
how-menstruations-apps-are-sharing-your-data [https://perma.cc/6TMH-2CRU].
     2. See Elena Maris, Timothy Libert & Jennifer R. Henrichsen, Tracking Sex: The
Implications of Widespread Sexual Data Leakage and Tracking on Porn Websites, 22 NEW
MEDIA & SOC’Y 2018, 2025-26 (2020).
     3. Steven Musil, Internet-Connected Vibrator Connects with Privacy Lawsuit, CNET
(Sept. 13, 2016, 4:15 PM), https://www.cnet.com/news/internet-connected-vibrator-we-vibe-
lawsuit-privacy-data/ [https://perma.cc/XK9Y-H4X9].
     4. Jennings Brown, The Amazon Alexa Eavesdropping Nightmare Came True, GIZMODO
(Dec. 20, 2018, 11:24 AM), https://gizmodo.com/the-amazon-alexa-eavesdropping-nightmare-
came-true-1831231490 [https://perma.cc/J6T7-ZXTT].
     5. See, e.g., Thomas Germain, How Private Is Your Online Dating Data?, CONSUMER
REPS. (Sept. 21, 2019), https://www.consumerreports.org/privacy/how-private-is-your-online-
dating-data/ [https://perma.cc/MF52-4ENF]. They use online services that facilitate testing
for sexually transmitted infections and share the results with prospective partners. Kimberly
M. Aquiliana, STD Testing? Yeah, There Is an App for That, METRO (June 5, 2017),
https://www.metro.us/std-testing-yeah-theres-an-app-for-that/ [https://perma.cc/9UUM-
DVPA].
     6. For instance, people subscribe to dating apps that record their sexual preferences and
favorite positions, interest in threesomes, HIV status, and hookups. See Azeen Ghorayshi &
Sri Ray, Grindr Is Letting Other Companies See User HIV Status and Location Data,
BUZZFEED NEWS (Apr. 2, 2018, 11:13 PM), https://www.buzzfeednews.com/article/azeenghoray
shi/grindr-hiv-status-privacy [https://perma.cc/3PHU-5UH2]; Makena Kelly & Nick Statt,
Amazon Confirms It Holds on to Alexa Data Even if You Delete Audio Files, VERGE (July 3,
2019, 4:14 PM), https://www.theverge.com/2019/7/3/20681423/amazon-alexa-echo-chris-coons-
data-transcripts-recording-privacy [https://perma.cc/C6VQ-YWUR].
     7. See Kashmir Hill, Data Broker Was Selling Lists of Rape Victims, Alcoholics, and
2021]                A NEW COMPACT FOR SEXUAL PRIVACY                                   1767

   Whether anticipated and expected or unknown and unwanted by
individuals, the tracking of intimate information is poised for
explosive growth. Profits drive what I have previously described as
the “collection imperative.”8 For instance, analysts predict that with-
in five years, the “femtech market”—menstruation, fertility, and
sexual wellness apps—will be a $50 billion industry.9
   Personal data is the coin of the realm for our everyday products
and services.10 At some level, people understand that online services
are not actually free.11 But the firms intentionally structure the deal
in a manner that obscures its lopsided nature. Individual consumers
cannot fully grasp the potential risks, and few options exist for those
who do (beyond not using the service).12 Firms have every incentive
to reinforce the status quo, from which they earn considerable
profits.13
   The surveillance of intimate life garners significant returns with
little risk for businesses.14 The opposite is true for individuals.15 The

‘Erectile Dysfunction Sufferers,’ FORBES (Dec. 19, 2013, 3:40 PM), https://www.forbes.com/
sites/kashmirhill/2013/12/19/data-broker-was-selling-lists-of-rape-alcoholism-and-erectile-
dysfunction-sufferers/#42acebdb1d53 [https://perma.cc/9HWM-FED4]; Lorenzo Franceschi-
Bicchierai & Joseph Cox, Inside the ‘Stalkerware’ Surveillance Market, Where Ordinary People
Tap Each Other’s Phones, VICE: MOTHERBOARD (Apr. 18, 2017, 8:01 AM), https://www.vice.
com/en/article/53vm7n/inside-stalkerware-surveillance-market-flexispy-retina-x [https://
perma.cc/JPB3-QYXH]; Danielle Keats Citron, Spying Inc., 72 WASH. & LEE L. REV. 1243,
1244-47 (2015) [hereinafter Citron, Spying Inc.]; Danielle Keats Citron, Sexual Privacy, 128
YALE L.J. 1870, 1917-18 (2019) [hereinafter Citron, Sexual Privacy].
     8. Danielle Keats Citron, A Poor Mother’s Right to Privacy: A Review, 98 B.U. L. REV.
1139, 1141 (2018) [hereinafter Citron, A Poor Mother’s Right to Privacy].
     9. Drew Harwell, Is Your Pregnancy App Sharing Your Intimate Data with Your Boss?,
WASH. POST (Apr. 10, 2019, 3:11 PM) (internal quotation marks omitted), https://www.wash
ingtonpost.com/technology/2019/04/10/tracking-your-pregnancy-an-app-may-be-more-public-
than-you-think/ [https://perma.cc/G5B9-9NKQ].
    10. Chris Jay Hoofnagle & Jan Whittington, Free: Accounting for the Costs of the Internet’s
Most Popular Price, 61 UCLA L. REV. 606, 608-10 (2014).
    11. See SHOSHANA ZUBOFF, THE AGE OF SURVEILLANCE CAPITALISM: THE FIGHT FOR A
HUMAN FUTURE AT THE NEW FRONTIER OF POWER 10-11 (2019); JULIE E. COHEN, BETWEEN
TRUTH AND POWER: THE LEGAL CONSTRUCTIONS OF INFORMATIONAL CAPITALISM 44-46 (2019).
    12. See Hoofnagle & Whittington, supra note 10, at 635-36, 640-41.
    13. See Neil Richards & Woodrow Hartzog, A Duty of Loyalty for Privacy Law 9 (July 28,
2020) (unpublished manuscript), https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3642217
[https://perma.cc/ACL8-GD5E].
    14. This pattern happens across the economy but is particularly problematic when it
comes to sexual privacy, as I explore throughout this Article.
    15. See STIGLER COMM. ON DIGIT. PLATFORMS, STIGLER CTR. STUDY OF ECON. & STATE,
FINAL REPORT 11-12 (2019), https://www.chicagobooth.edu/research/stigler/news-and-media/
1768                      WILLIAM & MARY LAW REVIEW                        [Vol. 62:1763

private sector’s collection, use, storage, and disclosure of intimate
information undermines what I have elsewhere called “sexual
privacy” and “intimate privacy”—the ways people manage the
boundaries around intimate life.16 Sexual (or intimate) privacy
concerns information about, and access to, the body, particularly the
parts of the body associated with sex, gender, sexuality, and repro-
duction.17 It concerns information about, and access to, people’s sex
and gender; their sexual activities and interactions; their innermost
thoughts, desires, and fantasies; and their sexual and reproductive
health.18 This includes on- and offline activities, interactions,
communications, thoughts, and searches.19 It concerns information
about the decisions that people make about their intimate lives.20
   This Article focuses on the collection, use, storage, and disclosure
of information about sexual privacy, a crucial subset of sexual
privacy. I will use the terms “intimate information” and “intimate
data” interchangeably to refer to the subject matter of this piece:
information about our bodies and health; our sexuality, gender, and
sex; and our close relationships.
   Maintaining and protecting the privacy of intimate information
is foundational for interlocking interests, all of which are essential
for us to flourish as human beings.21 Privacy-afforded intimate
information enables identity- and self-development. It frees us to let
our guards down and engage in sexual and gender experimentation
and expression, alone or with trusted others (including com-
panies).22 It gives us sexual autonomy. Intimate or sexual privacy
also protects our dignity, enabling us to enjoy self-esteem and social
respect. Then, too, it frees us to form close intimate relationships

committee-on-digital-platforms-final-report [https://perma.cc/V6BM-JJM7] (“Firms that
collect and process private information do not internalize the harms associated with consumer
privacy and security breaches. Nor do they internalize negative externalities, or potential
misuses of data that impact people who are not their own consumers.”).
    16. See Citron, Sexual Privacy, supra note 7, at 1874-75, 1880-81.
    17. Id. at 1874.
    18. Id.
    19. See id.
    20. Id.
    21. See id. at 1883-85.
    22. See id. Sexual privacy protects the ability of people to be sexual on their own terms,
including being asexual. See id.
2021]               A NEW COMPACT FOR SEXUAL PRIVACY                               1769

with friends, lovers, and family members.23 As Charles Fried said
long ago, privacy is the precondition for love and intimacy.24 And,
lastly, it secures equal opportunity.25
    Our digital services and products could be built to protect our
sexual privacy and the experimentation, expression, and intimacy
that it makes possible. They could, but they are not. Why? Simply
put, privacy is not profitable. For individuals, the costs are signifi-
cant, though we do not have a real chance to understand the extent
of the damage. Private-sector surveillance of intimate information
strips individuals of the ability to decide who learns about their
miscarriages, breakups, HIV infections, and sexual assaults, now
and long into the future. It undermines people’s self-esteem as they
see themselves as intimate parts and not as whole selves.26 When
companies categorize and rate people as rape sufferers or escort
users and nothing more, they give those individuals fractured
identities.27 People’s self-expression and association are chilled.28
Fearful of unwanted surveillance, people stop using dating apps,
fertility trackers, or digital assistants.29 They refrain from browsing
sites devoted to gender experimentation, sexuality, and reproductive
health.30
    The damage may be hard for us to grasp as it is happening, but
it is no less profound or real. Intimate data reveals people’s physical
and emotional vulnerabilities, which firms exploit to their advan-
tage.31 When intimate data is leaked or disclosed to hackers and
criminals, individuals have an increased risk of reputational ruin,
blackmail, and extortion.32 When commercial hiring companies use

   23. See id. See generally DANIELLE KEATS CITRON, HATE CRIMES IN CYBERSPACE 193-95
(2014) [hereinafter CITRON, HATE CRIMES IN CYBERSPACE].
   24. See Charles Fried, Privacy, 77 YALE L.J. 475, 477-78 (1968).
   25. Citron, Sexual Privacy, supra note 7, at 1883-85.
   26. See id. at 1886.
   27. See id.
   28. See CITRON, HATE CRIMES IN CYBERSPACE, supra note 23, at 193-95.
   29. See Jonathon W. Penney, Internet Surveillance, Regulation, and Chilling Effects
Online: A Comparative Case Study, INTERNET POL’Y REV., May 26, 2017, at 13 [hereinafter
Penney, Case Study].
   30. See id. at 8-13.
   31. See infra Part II.A.
   32. Daniel J. Solove & Danielle Keats Citron, Risk and Anxiety: A Theory of Data-Breach
Harms, 96 TEX. L. REV. 737, 744-45 (2018); Kate Fazzini, Ashley Madison Cyber-Breach: 5
Years Later, Users Are Being Targeted with ‘Sextortion’ Scams, CNBC (Jan. 31, 2020, 9:25
1770                     WILLIAM & MARY LAW REVIEW                      [Vol. 62:1763

intimate data to mine, rank, and rate candidates, people may be
unfairly excluded from employment opportunities.33 People’s
insurance rates may rise because algorithms predict their need for
expensive fertility treatments or gender confirmation surgeries.34
   These risks are not evenly distributed across society. Women and
marginalized communities disproportionately bear the burden of
private-sector surveillance of intimate life.35 Given the way that
demeaning stereotypes work, intimate data will more often be used
to disadvantage women, sexual minorities, and racial minorities
rather than heterosexual white men.36 The femtech market will
surely have a disproportionate impact on women in healthcare,
employment, and insurance decisions.37 The majority of people
appearing on sites devoted to revenge porn and deep fake sex videos
are women and minorities.38 For people with intersecting margin-
alized identities, the harm is compounded.39 The denial of equal
opportunity in the wake of sexual privacy invasions is why I called
for the recognition of “cyber civil rights” more than a decade ago.40

AM), https://www.cnbc.com/2020/01/31/ashley-madison-breach-from-2015-being-used-in-sextor
tion-scams.html [https://perma.cc/WLN2-J7F2].
    33. See Ifeoma Ajunwa & Daniel Greene, Platforms at Work: Automated Hiring Platforms
and Other New Intermediaries in the Organization of Work, in 33 RESEARCH IN THE SOCIOLOGY
OF WORK, WORK AND LABOR IN THE DIGITAL AGE 61, 79 (Steven P. Vallas & Anne Kovalainen
eds., 2019). See generally Marie Hicks, Hacking the Cis-tem: Transgender Citizens and the
Early Digital State, 41 IEEE ANNALS HIST. COMPUTING 20, 28 (2019); SAFIYA UMOJA NOBLE,
ALGORITHMS OF OPPRESSION: HOW SEARCH ENGINES REINFORCE RACISM 123-25 (2018).
    34. Jaden Urbi, Some Transgender Drivers Are Being Kicked Off Uber’s App, CNBC (Aug.
13, 2018, 9:21 AM), https://www.cnbc.com/2018/08/08/transgender-uber-driver-suspended-
tech-oversight-facial-recognition.html [https://perma.cc/4X59-3T3W]; SARAH MYERS WEST,
MEREDITH WHITTAKER & KATE CRAWFORD, AI NOW INSTITUTE, DISCRIMINATING SYSTEMS:
GENDER, RACE, AND POWER IN AI 17-18 (2019), https://ainowinstitute.org/discriminatingsys
tems.pdf [https://perma.cc/5JD9-VS57].
    35. See Citron, Sexual Privacy, supra note 7, at 1928.
    36. Id.; CITRON, HATE CRIMES IN CYBERSPACE, supra note 23, at 9-17.
    37. As suggested above, this is the direct result of the data collection campaigns of
femtech companies.
    38. See Citron, Sexual Privacy, supra note 7, at 1919-20, 1924.
    39. See Mary Anne Franks, Democratic Surveillance, 30 HARV. J.L. & TECH. 425, 464
(2017); see also Citron, Sexual Privacy, supra note 7, at 1892-93; Joy Buolamwini & Timnit
Gebru, Gender Shades: Intersectional Accuracy Disparities in Commercial Gender
Classification, 81 PROC. MACH. LEARNING RSCH. 77, 88 (2018).
    40. See Danielle Keats Citron, Cyber Civil Rights, 89 B.U. L. REV. 61, 84-85 (2009)
[hereinafter Citron, Cyber Civil Rights].
2021]                 A NEW COMPACT FOR SEXUAL PRIVACY                                   1771

   Despite the enormity of these potential harms, intimate informa-
tion lacks meaningful legal protection. American law generally
treats privacy as a consumer protection matter. It focuses on
policing firms’ notice to consumers about their data practices and
any deception associated with those practices.41 For the most part,
the collection, use, storage, and sharing of intimate data are enabled
by this approach rather than restricted by it.42 Tracking intimate
data is not just permissible. It is viewed as beneficial.43 But the
truth of the matter is that human flourishing is being impaired, not
secured.
   This Article offers a new compact for the protection of intimate
information. As a start, we need to revise our understanding of the
privacy afforded to intimate life. Treating sexual privacy as a
consumer protection problem underestimates the interests at stake.
The surveillance of intimate life matters—not just because firms fail
to provide notice or engage in deceptive practices but also because
they undermine autonomy, dignity, intimacy, and equality. It
matters because people’s crucial life opportunities, including
employment, education, housing, insurance, professional certifica-
tion, and self-expression, are on the line. It matters because our core
capabilities hang in the balance.
   All personal data needs protection, but even more so for intimate
information.44 Intimate information should not be collected or
processed without meaningful consent—knowing, voluntary, and
exceptional. Firms should not use intimate information to manipu-
late people to act against their interests. Firms should have robust
obligations of confidentiality, discretion, and loyalty when handling
intimate data. Available remedies should include injunctive relief
ordering firms to stop processing intimate data until legal commit-
ments are satisfied. Repeated violations can and should result in the

    41. See, e.g., Richards & Hartzog, supra note 13, at 38, 40-41.
    42. See id.
    43. Julie E. Cohen, Turning Privacy Inside Out, 20 THEORETICAL INQUIRIES L. 1, 11 (2019)
(explaining that the collection and processing of personal data are “position[ed] ... as virtuous
and productive, and therefore ideally exempted from state control”).
    44. See Paul Ohm, Sensitive Information, 88 S. CAL. L. REV. 1125, 1128-29 (2015); Danielle
Keats Citron, Reservoirs of Danger: The Evolution of Public and Private Law at the Dawn of
the Information Age, 80 S. CAL. L. REV. 241, 244-45 (2007) [hereinafter Citron, Reservoirs of
Danger].
1772                       WILLIAM & MARY LAW REVIEW                         [Vol. 62:1763

“data death penalty”—forbidding a firm’s handling of personal data
now and in the future.45 Given that with enough personal data we
can infer intimate information, all personal data deserves strong
protection.46
  This Article has three parts. Part I provides a snapshot into the
corporate surveillance of intimate life. It categorizes the surveil-
lance into first- and third-party data collection. Part II highlights
the damage that corporate intimate surveillance causes to the
values that sexual privacy secures and the harm to human well-
being that it inflicts. It provides an overview of the legal landscape
and the extent to which law is failing us. Part III offers a plan of
action for the protection of intimate information. It provides guide-
posts for regulating the private sector’s surveillance of intimate
information, and it suggests affirmative obligations for firms and
additional remedies.

    45. See infra Part III.A.3. Thanks to Woodrow Hartzog for suggesting the concept of the
“data death penalty” to describe stop processing orders.
    46. There is terrific scholarship on the contours of strong baseline privacy protections. See
generally Neil Richards & Woodrow Hartzog, The Pathologies of Digital Consent, 96 WASH.
U. L. REV. 1461 (2019) [hereinafter Richards & Hartzog, Pathologies of Digital Consent];
Woodrow Hartzog, The Inadequate, Invaluable Fair Information Practices, 76 MD. L. REV. 952
(2017) [hereinafter Hartzog, Inadequate, Invaluable Fair Information Practices]; Neil Richards
& Woodrow Hartzog, Taking Trust Seriously in Privacy Law, 19 STAN. TECH. L. REV. 431
(2016); Woodrow Hartzog, The Case Against Idealising Control, 4 EUR. DATA PROT. L. REV. 423
(2018) [hereinafter Hartzog, The Case Against Idealising Control]; Richards & Hartzog, supra
note 13. Cameron Kerry has been thoughtfully exploring the various proposals for data
privacy reform at the federal level. See, e.g., Cameron F. Kerry, Protecting Privacy in an AI-
Driven World, BROOKINGS (Feb. 10, 2020), https://www.brookings.edu/research/protecting-
privacy-in-an-ai-driven-world/ [https://perma.cc/8J4T-VU8K]; Cameron Kerry, Data Collection
Standards in Privacy Legislation: Proposed Language, LAWFARE (Apr. 10, 2019, 11:20 AM),
https://www.lawfareblog.com/data-collection-standards-privacy-legislation-proposed-language
[https://perma.cc/6K7W-YL6X] [hereinafter Kerry, Proposed Language]; Cameron F. Kerry,
Op-Ed: A Federal Privacy Law Could Do Better than California’s, L.A. TIMES (Apr. 25, 2019,
3:05 AM), https://www.latimes.com/opinion/op-ed/la-oe-kerry-ccpa-data-privacy-laws-201904
25-story.html [https://perma.cc/QR6Y-MA69]; Cameron F. Kerry & John B. Morris, Jr., Why
Data Ownership Is the Wrong Approach to Protecting Privacy, BROOKINGS (June 26, 2019),
https://www.brookings.edu/blog/techtank/2019/06/26/why-data-ownership-is-the-wrong-
approach-to-protecting-privacy/ [https://perma.cc/QT9S-SNAD].
2021]                 A NEW COMPACT FOR SEXUAL PRIVACY                                   1773

         I. UNDERSTANDING PRIVATE-SECTOR SURVEILLANCE OF
                          INTIMATE LIFE

   This Part gives us a glimpse of the private sector’s wide-ranging
surveillance of intimate life.47 First, Section A describes scenarios of
first-party collection—or instances in which people have relation-
ships with businesses collecting their intimate information. Then,
Section B gives examples of third-party collection—or instances in
which people lack a direct relationship with private entities han-
dling their intimate information. I use the concepts of first- and
third-party data collection to organize the varied commercial
scenarios in which intimate information is collected, processed,
used, and shared.48

A. Cataloging First-Party Collection

  Businesses routinely gather intimate information directly from
individuals.49 First-party collection occurs on sites related to sexual

    47. Karen Levy has a wonderful short symposium piece focusing on surveillance practices
in the home, often (though not always) involving consensual intimate partners. Karen E.C.
Levy, Intimate Surveillance, 51 IDAHO L. REV. 679 (2015). In that work, Professor Levy divides
intimate surveillance into three categories: dating, tracking intimate and romantic partners,
and fertility monitoring. Id. at 681-86. In this Article, I explore the collection, use, sharing,
and storage of information relating to all aspects of intimate life, including—but not limited
to—the home, building on my work on commercial databases of sensitive information, cyber
civil rights, nonconsensual pornography, cyber stalking apps, sexual privacy, and deep fakes.
See Citron, Reservoirs of Danger, supra note 44; Citron, Cyber Civil Rights, supra note 40;
Danielle Keats Citron & Mary Anne Franks, Criminalizing Revenge Porn, 49 WAKE FOREST
L. REV. 345 (2014); Danielle Keats Citron, Protecting Sexual Privacy in the Information Age,
in PRIVACY IN THE MODERN AGE 46 (Marc Rotenberg, Julia Horwitz & Jeramie Scott eds.,
2015); Citron, Spying Inc., supra note 7; Citron, Sexual Privacy, supra note 7; Danielle Keats
Citron, Why Sexual Privacy Matters for Trust, 96 WASH. U. L. REV. 1189 (2019) [hereinafter
Citron, Why Sexual Privacy Matters for Trust]; Bobby Chesney & Danielle Keats Citron, Deep
Fakes: A Looming Challenge for Privacy, Democracy, and National Security, 107 CALIF. L.
REV. 1753 (2019). I discuss first- and third-party data collection as a way to understand the
broad array of firms involved in collecting, using, sharing, and storing intimate information.
    48. It is worth noting that while the very concept of first- and third-party data collection
makes those processes seem normal and routine, they are anything but. I am using those
shorthand references given their prevalence in public conversation.
    49. See Levy, supra note 47, at 679-80.
1774                       WILLIAM & MARY LAW REVIEW                        [Vol. 62:1763

and reproductive health, porn sites, dating apps, and personal
devices.50

   1. Our Bodies: Our Sexual and Reproductive Health

   Countless websites and apps are devoted to the collection of
information about our bodies, including our sexual and reproductive
health. These sites and apps let people track their sex lives—
including when they had sex, with whom, whether they used
protection—and when they masturbate.51 Some platforms host
community forums where subscribers can connect with each other
to discuss their sex lives.52 Health apps let users track their sexual
activity.53 A start-up founded by five men claims that its app
developed an algorithm that identifies and proves female orgasms.54
   Some sexual health start-ups are focused on men.55 For instance,
Ro sends erectile dysfunction drugs directly to consumers.56 Hims
provides treatments for male hair and sexual issues.57 Each firm
raised more than $80 million in financing.58
   Far more extensive, however, is the tracking of women’s health.
The term “femtech” describes apps, services, products, and sites that

    50. See Emma McGowan, How Tracking Your Sex Life Can Make It Better & 7 Apps to,
Uh, Do It with, BUSTLE (Jan. 9, 2020), https://www.bustle.com/p/tracking-your-sex-life-with-
apps-makes-it-super-easy-19779217 [https://perma.cc/RCL3-7HVX].
    51. Id.
    52. Id.
    53. Lux Alptraum, Apple’s Health App Now Tracks Sexual Activity, and That’s a Big
Opportunity, VICE: MOTHERBOARD (Oct. 23, 2016, 1:00 PM), https://www.vice.com/en/article/
8q8kpk/apples-health-app-now-tracks-sexual-activityand-that-a-big-opportunity [https://
perma.cc/8QJT-VFSL].
    54. See RELIDA LIMITED, https://www.relidalimited.com/ [https://perma.cc/4J5P-D427];
Rachel Moss, 5 Guys Created an Algorithm to ‘Validate the Female Orgasm’. It Went as Well
as You’d Expect, HUFFINGTON POST UK (June 12, 2020), https://www.huffingtonpost.co.uk/
entry/5-guys-created-an-algorithm-to-validate-the-female-orgasm-and-it-went-as-well-as-
youd-expect_uk_5ee0dc35c5b6cdc3fd432666 [https://perma.cc/CR5M-RV6V] (noting that
Relida Limited was founded by five men and that the company claimed on its website that the
app’s algorithm was created by a woman). After some bad publicity, the start-up’s website now
says that it is meant to measure orgasms of men and women. See RELINDA LIMITED, supra.
    55. See Dana Olsen, This Year Is Setting Records for Femtech Funding, PITCHBOOK (Oct.
31, 2018), https://pitchbook.com/news/articles/this-year-is-setting-records-for-femtech-funding
[https://perma.cc/TC8G-RAK4].
    56. Id.
    57. Id.
    58. Id.
2021]                 A NEW COMPACT FOR SEXUAL PRIVACY                                    1775

collect information about women’s period cycles, fertility, pregnan-
cies, menopause, and sexual and reproductive histories.59 Nearly
one-third of women in the United States have used period-tracking
apps.60 Menstrual tracking apps “are the fourth most popular health
app among adults and the second most popular among adolescent
females.”61 The start-up Gennev provides a “free” online menopause
health assessment that “collects 72 data points—and nearly 35,000
women took it in 2019.”62 Menopause start-ups have raised more
than $250 million from 2009 to 2019.63 Overall, femtech start-ups
raised nearly $500 million in 2019 alone.64
   Subscribers of menstrual tracking apps enter, among other
things, their weight, temperatures, moods, reading material, sexual
encounters, tampon use, alcohol consumption, cigarette and coffee
habits, bodily secretions, and birth control pills.65 Apple’s Health

    59. Harwell, supra note 9.
    60. Donna Rosato, What Your Period Tracker App Knows About You, CONSUMER REPS.
(Jan. 28, 2020), https://www.consumerreports.org/health-privacy/what-your-period-tracker-
app-knows-about-you/ [https://perma.cc/B6PN-A5UW]. There are also fertility apps that track
women’s menstrual cycles and pregnancy apps that monitor women’s habits, mood, fetal
movements, and more. See Vanessa Rizk & Dalia Othman, Quantifying Fertility and
Reproduction Through Mobile Apps: A Critical Overview, 22 ARROW FOR CHANGE 13, 13-14
(2016). Some apps, such as Glow, cover all aspects of fertility, including tracking women’s
cycles, fertility, pregnancy, and a baby’s development in the first year. E.g., Jerry Beilinson,
Glow Pregnancy App Exposed Women to Privacy Threats, Consumer Report Finds, CONSUMER
REPS. (Sept. 17, 2020), https://www.consumerreports.org/mobile-security-software/glow-
pregnancy-app-exposed-women-to-privacy-threats/ [https://perma.cc/AQK7-TZS6].
    61. See Michelle L. Moglia, Henry V. Nguyen, Kathy Chyjek, Katherine T. Chen & Paula
M. Castaño, Evaluation of Smartphone Menstrual Cycle Tracking Applications Using an
Adapted APPLICATIONS Scoring System, 127 OBSTETRICS & GYNECOLOGY 1153, 1153 (2016)
(footnote omitted).
    62. Eliza Haverstrock, Narrative Change: VCs Are Finally Ready to Talk About Meno-
pause, PITCHBOOK (May 28, 2020), https://pitchbook.com/news/articles/vc-menopause-femtech
[https://perma.cc/4K6C-SRB7].
    63. Id.
    64. Id.
    65. See No Body’s Business but Mine, supra note 1. For instance, the app Clue goes further
and asks subscribers to track “not just [the] dates and details of periods and menstrual
cycles,” but also their discharge of cervical fluids, their use of medication, and their sex life,
injections, illnesses, and cervical position. See Sadaf Khan, Data Bleeding Everywhere: A Story
of Period Trackers, DEEP DIVES (June 7, 2019), https://deepdives.in/data-bleeding-everywhere-
a-story-of-period-trackers-8766dc6a1e00 [https://perma.cc/UD2K-PQXF]. The Ovia Fertility
app lets users indicate the consistency of their cervical discharge, from “egg whites, water, or
a bottle of school glue.” Id. Period-tracking apps are also marketed to people’s partners so that
they can manage their relationships around menstrual cycles. Levy, supra note 47, at 685-86
(discussing apps such as PMSTracker and iAmAMan, which enable subscribers to track
1776                      WILLIAM & MARY LAW REVIEW                      [Vol. 62:1763

app syncs with period and fertility tracking apps and allows sub-
scribers to track their sexual activity.66 The Flo app provides extra
features such as period predictions and health reports that can be
shared with doctors.67 Some services let subscribers obtain discounts
on products, such as tampons.68
   Consider the Eve Glow app.69 Subscribers must record their sex
drive status with the following choices: “DO ME NOW,” “I’m down,”
or “MIA.”70 To complete their health log, subscribers must input
whether they orgasmed during sex.71 The app’s screen enables
subscribers to answer “YASSS,” “No,” or “Faked It.”72 They are
asked to indicate whether they are experiencing cramps, tender
breasts, or bloating.73
   Femtech apps like Eve Glow host discussion boards where people
using the services talk to each other about their intimate lives,
including their experiences with sex, fertility, abortions, or miscar-
riages.74 A user of Eve Glow explained that she “kind of lose[s her]
inhibition because so many other women are talking about” their
intimate lives on the discussion boards.75 The apps track and store
those communications.76
   Three million people use Glow’s suite of apps, which include Eve
Glow, Glow, Glow Nurture, and Glow Baby.77 The company is part
of HVF Labs, whose “objective is to take advantage of potential low

multiple women’s cycles and use multiple passwords to allow users to conceal their tracking
activity).
    66. Alptraum, supra note 53. Some apps are exclusively designed to track people’s sexual
activity. For example, the BedPost app allows subscribers to track the names of sexual part-
ners, track the dates of sexual experiences, and rank those sexual experiences. See BEDPOST,
http://www.bedposted.com [https://perma.cc/2JAD-V8FL].
    67. See Rosato, supra note 60.
    68. Id.
    69. EVE GLOW, https://glowing.com/apps [https://perma.cc/T99X-UD2V].
    70. Khan, supra note 65. MIA presumably means “Missing In Action.”
    71. Id.
    72. Id.
    73. Id.
    74. See id.
    75. Id.
    76. Id.
    77. See Natasha Felizi & Joana Varon, MENSTRUAPPS—How to Turn Your Period into
Money (for Others), CODING RIGHTS: CHUPADADOS, https://chupadados.codingrights.org/en/men
struapps-como-transformar-sua-menstruacao-em-dinheiro-para-os-outros/ [https://perma.cc/
NGJ2-3NFG].
2021]                A NEW COMPACT FOR SEXUAL PRIVACY                                 1777

cost sensors, the gradual increase in access to broadband, and the
high storage capacity to collect and explore data as a commodity.”78
Glow’s privacy policy says that the company may decide to share
information collected on the app with third parties to inform users
about goods and services including those conducting medical
research.79 Only some of the user data shared is “made anony-
mous.”80
   Businesses pair health devices with apps to track individuals’
intimate data. Looncup, for instance, is poised to offer a smart
menstrual cup that records the volume and color of menstrual fluid
on its app, ostensibly for health benefits.81 Trackle links a vaginal
thermometer with an app measuring women’s inner temperature.82
   Reproductive health apps market themselves as providing expert
advice.83 Yet many such apps—particularly those that are “free”—
are riddled with inaccurate information.84 In one study, researchers
evaluated 108 free menstrual cycle tracking apps and concluded
that more than 80 percent of them were “inaccurate, contain[ed]
misleading health information, or d[id] not function.”85
   Femtech apps also have been prone to security problems. In 2016,
Consumer Reports found that anyone could access Glow subscribers’
health data, including the dates of abortions and sexual encounters,
if they had their email addresses.86 Flo was caught sending Face-
book subscribers’ information, including when they were trying to
conceive and having their periods.87

    78. Id. (emphasis added) (internal quotation marks omitted).
    79. Id.
    80. Id.
    81. See, e.g., LOONCUP—The World’s First SMART Menstrual Cup, KICKSTARTER,
https://www.kickstarter.com/projects/700989404/looncup-the-worlds-first-smart-menstrual-
cup [https://perma.cc/M7Q9-YZUW].
    82. How Trackle Works, TRACKLE, https://trackle.de/en/about-trackle-2/how-trackle-works/
[https://perma.cc/34WJ-T5F9].
    83. See, e.g., EVE GLOW, supra note 69.
    84. See Moglia et al., supra note 61, at 1157.
    85. Id.
    86. Beilinson, supra note 60.
    87. See Sam Schechner & Mark Secada, You Give Apps Sensitive Personal Information.
Then They Tell Facebook, WALL ST. J. (Feb. 22, 2019, 11:07 AM), https://www.wsj.com/articles/
you-give-apps-sensitive-personal-information-then-they-tell-facebook-11550851636 [https://
perma.cc/4BHA-BNZB]
1778                      WILLIAM & MARY LAW REVIEW                        [Vol. 62:1763

   2. Adult Sites

   Pornography sites collect and store a wealth of information about
people’s sexual interests, desires, and sexual practices.88 They track
people’s search queries, the time and frequency of their visits, and
private chats.89 The most popular free porn site, PornHub, reports
that some of the most searched terms on the site include “lesbian,”
“milf,” “step mom,” and “teen.”90 The very nature of some adult sites
reveals people’s sexual interests, such as bestiality or incest sites.91
   Some specialty sites require members to provide email addresses,
passwords, and credit card information.92 A zoophilia forum accumu-
lated personal information for about 71,000 individuals, including
usernames, birth dates, and IP addresses.93 Rosebuttboard.com, a
forum dedicated to “extreme anal dilation and anal fisting,” re-
corded the personal information of 100,000 user accounts, including
the email addresses of military members and federal employees.94
   Adult sites are some of the most popular sites online. They garner
more visitors a month than Amazon, Netflix, and Twitter

    88. Maris et al., supra note 2, at 2019.
    89. See id.
    90. See The 2019 Year in Review, PORNHUB INSIGHTS (Dec. 11, 2019), https://www.
pornhub.com/insights/2019-year-in-review#searches [https://perma.cc/D3Y8-WHKD]; see also
Michael Castleman, Surprising New Data from the World’s Most Popular Porn Site, PSYCH.
TODAY (Mar. 15, 2018), https://www.psychologytoday.com/us/blog/all-about-sex/201803/surpris
ing-new-data-the-world-s-most-popular-porn-site [https://perma.cc/377Z-K8WQ].
    91. Maris et al., supra note 2, at 2027.
    92. Joseph Cox, Thousands of Bestiality Website Users Exposed in Hack, VICE: MOTHER-
BOARD (Mar. 29, 2018, 1:59 AM), https://www.vice.com/en_us/article/evqvpz/bestiality-website
hacked-troy-hunt-have-i-been-pwned [https://perma.cc/VY5W-3AUW] (explaining that hack
of bestiality site revealed more than 3,000 users’ email addresses as well as users’ password
hashes, birthdates, IP addresses, and private messages).
    93. See Have I Been Pwned (@haveibeenpwned), TWITTER (Oct. 19, 2019, 5:25 PM), https://
twitter.com/haveibeenpwned/status/1185668262538838016 [https://perma.cc/8XDD-F34B].
Hackers exposed the personal details of the users of the bestiality site online. Waqas, Animal
Abuse Website Hacked; Thousands of Users Exposed, HACKREAD (Mar. 30, 2018), https://www.
hackread.com/animal-abuse-website-hacked-users-exposed/ [https://perma.cc/335L-5K8T].
    94. Joseph Cox, Another Day, Another Hack: Is Your Fisting Site Updating Its Forum
Software?, VICE: MOTHERBOARD (May 10, 2016, 9:54 AM), https://www.vice.com/en_us/article/
qkjj4p/rosebuttboard-ip-board [https://perma.cc/8YKX-DYXT]; Jonathan Keane, Hack Shows
Government and Military Employees Used Their Email Addresses on Hardcore Fetish Site,
DIGIT. TRENDS (May 13, 2016), https://www.digitaltrends.com/computing/rosebutt-hack/
[https://perma.cc/9RDE-EDUN]; Troy Hunt (@troyhunt), TWITTER (May 10, 2016, 10:06 AM),
https://twitter.com/troyhunt/status/730036184651431937 [https://perma.cc/EMZ5-6SNF].
2021]               A NEW COMPACT FOR SEXUAL PRIVACY                                 1779

combined.95 In 2018, PornHub had 33.5 billion visits.96 It had an
average of 63,000 visitors per minute.97 In 2019, that number grew
to 80,000 visitors per minute.98

   3. Dating Apps

   Dating apps and services collect broad swaths of people’s intimate
information, including their names, photographs, occupations,
locations, relationship status, romantic or sexual interests, sexual
orientation, interest in extramarital affairs, and sexually transmit-
ted infections.99 Adults are not the only ones on dating apps;
teenagers also subscribe to Tinder, MeetMe, Hot or Not, MyLOL,
and Kik.100 Such sites are commonly used by LGBTQ youth who lack
supportive networks at school to connect with others.101
   Simple behaviors on these apps and sites, such as how long a user
views a particular profile or image, can reveal the characteristics or
features that a person looks for in a romantic partner.102 Journalist
Judith Duportail discovered just how extensive her disclosures to

    95. Maris et al., supra note 2, at 2019.
    96. Digital Fingerprints: How the Porn You Watch May Be Watching You, FIGHT THE
NEW DRUG (Feb. 15, 2019), https://fightthenewdrug.org/how-your-porn-may-be-watching-you/
[https://perma.cc/L9N7-HFX4].
    97. Can You Guess 2018’s Most-Viewed Categories on the Largest Porn Site?, FIGHT THE
NEW DRUG (July 9, 2019), https://fightthenewdrug.org/pornhub-visitors-in-2018-and-review-of-
top-searches/ [https://perma.cc/3STF-AV9J].
    98. The 2019 Year in Review, supra note 90.
    99. See Thomas Germain, How Private Is Your Online Dating Data?, CONSUMER REPS.
(Sept. 21, 2019), https://www.consumerreports.org/privacy/how-private-is-your-online-dating-
data/ [https://perma.cc/MF52-4ENF] (“You might never choose to share those thousands of
intimate facts with a friend or family member, but if you use dating apps, you are providing
the information to companies that will collect and retain every detail.”); see also Michael
Zimmer, OKCupid Study Reveals the Perils of Big-Data Science, WIRED (May 14, 2016, 7:00
AM), https://www.wired.com/2016/05/okcupid-study-reveals-perils-big-data-science/ [https://
perma.cc/DN53-CJRL]. It is worth noting the rise of dating intelligence apps like Lulu. This
app “allows women to anonymously review and rate men.” See Dating Intelligence App Lulu
Acquired by Badoo, PITCHBOOK (Feb. 10, 2016), https://pitchbook.com/newsletter/dating-
intelligence-app-lulu-acquired-by-badoo [https://perma.cc/427V-HM6Q]. Lulu raised $6 million
in venture funding and was acquired by Badoo in 2016. Id.
  100. Christine Elgersma, Tinder and 7 More Dating Apps Teens Are Using, COMMON SENSE
MEDIA (Feb. 12, 2019), https://www.commonsensemedia.org/blog/tinder-and-7-more-dating-
apps-teens-are-using [https://perma.cc/PVT4-4659]. Teenagers can access some of these apps
via Facebook. Id.
  101. Id.
  102. Germain, supra note 99.
1780                         WILLIAM & MARY LAW REVIEW                            [Vol. 62:1763

Tinder were when the company complied with her request for her
records as required by the General Data Protection Regulation
(GDPR).103 The company returned eight hundred pages detailing
her activities and interactions.104 A review of the 1,700 messages
Duportail sent through the app revealed her “hopes, fears, sexual
preferences and deepest secrets.”105
   All of this intimate information is ripe for exploitation and dis-
closure.106 In some cases, this data may appear in the profiles of
potential matches.107 As explored below, it may be shared with
advertisers and other firms.108
   And firms’ data collections may be inadequately secured and
stolen. Hackers have targeted dating services to steal intimate

   103. Regulation (EU) 2016/679 of the European Parliament and of the Council on the
Protection of Natural Persons with Regard to the Processing of Personal Data and on the Free
Movement of Such Data, and Repealing Directive 95/46/EC (General Data Protection
Regulation), 2016 O.J. (L 119) 1 [hereinafter GDPR].
   104. Judith Duportail, I Asked Tinder for My Data. It Sent Me 800 Pages of My Deepest,
Darkest Secrets, GUARDIAN (Sept. 26, 2017, 2:10 AM), https://www.theguardian.com/technol
ogy/2017/sep/26/tinder-personal-data-dating-app-messages-hacked-sold [https://perma.cc/
WS2Z-U2J2]. The documents included Duportail’s Facebook likes and number of friends, links
to her Instagram photos, her education, the age-range of men she was interested in, the
number of times she opened the app, the number of people she matched with, and where and
when each conversation with a match took place. Id. Facebook started a dating app in 2019.
Nathan Sharp, It’s Facebook Official, Dating Is Here, FACEBOOK (Sept. 5, 2019), https://about.
fb.com/news/2019/09/facebook-dating/ [https://perma.cc/Q5CZ-QKVD] (announcing the launch
of Facebook’s dating app); see also Charlie Warzel, Don’t Trust Facebook With Your Love Life,
N.Y. TIMES (Sept. 5, 2019), https://www.nytimes.com/2019/09/05/opinion/facebook-dating-
app.html [https://perma.cc/H45K-UPG4].
   105. Duportail, supra note 104.
   106. Id. (“Tinder’s privacy policy clearly states: ‘you should not expect that your personal
information, chats, or other communications will always remain secure.’”); see also Privacy
Policy, TINDER, https://www.gotinder.com/privacy [https://perma.cc/8UL2-TFVN] (“As with
all technology companies, although we take steps to secure your information, we do not
promise, and you should not expect, that your personal information will always remain
secure.”).
   107. In 2016, Danish researchers refused to anonymize a data set containing 70,000 OK
Cupid users’ “usernames, age, gender, location, what kind of relationship (or sex) they’re
interested in, personality traits, and answers to thousands of profiling questions.” Zimmer,
supra note 99. The researchers argued that the information was already “publicly available,”
though Zimmer notes that this is not entirely accurate. Id. “Since OkCupid users have the
option to restrict the visibility of their profiles to logged-in users only, it is likely the research-
ers collected—and subsequently released—profiles that were intended to not be publicly
viewable.” Id. (emphasis omitted).
   108. See infra Part I.B.
2021]                A NEW COMPACT FOR SEXUAL PRIVACY                                   1781

information in order to blackmail and extort subscribers.109 In 2015,
a data breach resulted in hackers publishing online the personal
details of subscribers to Ashley Madison, a site for people seeking
extramarital affairs. Millions of subscribers’ names, emails, sexual
preferences, and sexual desires were posted online in a searchable
format.110 Criminals continue to use the intimate information
shared with Ashley Madison in extortion schemes.111
   Membership of or browsing on particular dating sites may reveal
someone’s sexual preferences and habits.112 In October 2016,
hackers obtained 412 million account records from Friend Finder
Networks.113 The information exposed included “email addresses,

   109. Lily Hay Newman, Hacks, Nudes, and Breaches: It’s Been a Rough Month for Dating
Apps, WIRED (Feb. 15, 2019, 4:44 PM), https://www.wired.com/story/ok-cupid-dating-apps-
hacks-breaches-security/ [https://perma.cc/SE99-ZWPS] (“The same factors that make dating
sites an appealing target for hackers also make them useful for romance scams: It’s easier to
assess and approach people on a site that are already meant for sharing information with
strangers.”).
   110. Zak Doffman, Ashley Madison Hack Returns to ‘Haunt’ Its Victims: 32 Million Users
Now Watch and Wait, MEDIUM (Feb. 1, 2020, 7:06 AM), https://www.forbes.com/sites/zakdoff
man/2020/02/01/ashley-madison-hack-returns-to-haunt-its-victims-32-million-users-now-have-
to-watch-and-wait/#6151c2395677 [https://perma.cc/6QNP-NHCU] (explaining that the Ashley
Madison hack resulted in the leaking of intimate information of 32 million people). Ashley
Madison touted its service as enabling “infidelity and married dating.” Kim Zetter, Hackers
Finally Post Stolen Ashley Madison Data, WIRED (Aug. 18, 2015, 5:55 PM), https://www.wired.
com/2015/08/happened-hackers-posted-stolen-ashley-madison-data/ [https://perma.cc/P672-
Z6YF]. The data released by hackers included names, passwords, addresses, and phone
numbers submitted by users of the site. Id. Also included were users’ credit card transactions,
revealing people’s real names and addresses. Id. The data dump revealed members’ sexual
fantasies and desires, such as “I like lots of foreplay and stamina, fun, discretion, oral, even
willingness to experiment.” Id. As Karen Levy wisely noted, “The real benefit of self-tracking
is always to the company.... People are being asked to do this at a time when they’re
incredibly vulnerable and may not have any sense where that data is being passed.” Harwell,
supra note 9 (quoting Cornell professor Karen Levy). Nor do they realize how easy it is to re-
identify such information. See id.
   111. Doffman, supra note 110 (explaining that victims of Ashley Madison hack continue to
receive emails with embarrassing details from the breach and with demands for bitcoin
ransoms to be paid in “a limited amount of time”).
   112. See, e.g., Cox, supra note 92; Michelle Broder Van Dyke, Pastor Exposed by Ashley
Madison Hack Kills Himself, BUZZFEED NEWS (Sept. 8, 2015, 8:52 PM), https://www.buzz
feednews.com/article/mbvd/pastor-exposed-by-ashley-madison-hack-commits-suicide [https://
perma.cc/HE5H-7GXB].
   113. Samuel Gibbs, Adult Friend Finder and Penthouse Hacked in Massive Personal Data
Breach, GUARDIAN (Nov. 14, 2016, 6:21 AM), https://www.theguardian.com/technology/2016/
nov/14/adult-friend-finder-and-penthouse-hacked-in-largest-personal-data-breach-on-record
[https://perma.cc/B56T-EWXS] (“Among the leaked account details were 78,301 US military
email addresses, 5,650 US government email addresses and over 96 [million] Hotmail
1782                      WILLIAM & MARY LAW REVIEW                       [Vol. 62:1763

passwords, dates of last visits, browser information, IP addresses
and site membership status across sites run by Friend Finder Net-
works,” including Adult Friend Finder, Cams.com, Penthouse.com,
and three other sites.114 Three years later, a hacker obtained
250,000 “email addresses, usernames, IP addresses, and hashed
passwords” from the Dutch sex-work forum Hookers.nl where
“clients discuss[ed] their experiences with sex workers.”115

   4. Personal Devices

  An array of devices records people’s intimate activities and
interactions. Sex toys are obvious examples. We-Vibe, a networked
vibrator, allows subscribers to control others’ devices via an app.116
The app also enables partners to communicate with each other via
text or video chat.117 The Lioness vibrator similarly enables sub-
scribers to live stream “what’s going on in the moment” and permits
partners to remotely control the device.118 Companies sell Wi-Fi

accounts. The [leak] ... also included the details of what appear to be almost 16 [million]
deleted accounts.”).
   114. Id. “This is not the first time Adult Friend Network has been hacked. In May 2015 the
personal details of almost four million users were leaked by hackers, including their login
details, emails, dates of birth, post codes, sexual preferences and whether they were seeking
extramarital affairs.” Id. The inclusion of data from Penthouse.com in the 2016 breach was
particularly concerning as Friend Finder Networks sold the site to Penthouse Global Media
in February 2016. Id.
   115. Samantha Cole & Joseph Cox, A Hacker Stole 250k User Account Details from a Dutch
Sex Work Site, VICE: MOTHERBOARD (Oct. 10, 2019, 10:32 AM), https://www.vice.com/en_us/
article/d3a5gy/hacker-stole-user-account-details-from-a-dutch-sex-work-site-hookers-nl
[https://perma.cc/R4V4-T7G7] (“Although prostitution is legal and regulated in the Nether-
lands, people still seek anonymity when they’re buying services—whether from websites like
Hookers.nl or in person at brothels.”); Thomas Brewster, Dutch Prostitution Site Hookers.nl
Hacked—250,000 Users’ Data Leaked, FORBES (Oct. 10, 2019, 8:43 AM), https://www.forbes.
com/sites/thomasbrewster/2019/10/10/dutch-prostitution-site-hookersnl-hacked--250000-users-
data-leaked/?sh=41fadb1822f8 [https://perma.cc/WG74-VGUB] (“Dutch broadcaster NOS,
which broke the story ... viewed some of the data and said it could determine some real names
of users.”).
   116. Musil, supra note 3.
   117. Id.
   118. Now You Can See Your Orgasm in Real Time, LIONESS (Apr. 15, 2019), https://blog.
lioness.io/now-you-can-see-your-orgasm-in-real-time-359afbdfa6d0 [https://perma.cc/N8ST-
BYE3]. We-Vibe recorded the dates and times of a vibrator’s use and the intensity and mode
selected by subscribers without their consent, leading to a class action lawsuit discussed in
Part II. See Amended Class Action Complaint & Demand for Jury Trial at 1-2, N.P. v.
Standard Innovation Corp., Case No. 1:16-cv-8655 (E.D. Ill. Feb. 27, 2017).
2021]                A NEW COMPACT FOR SEXUAL PRIVACY                                  1783

enabled butt plugs, vibrating masturbators for men, and devices for
the penis that track thrusting.119 Like many consumer goods,
internet-connected sex toys are not developed with privacy and secu-
rity in mind.120
   While voice-enabled personal assistants that listen to and record
people’s activities are less obviously related to intimate life, they are
no less important.121 Amazon’s Echo and other Alexa-enabled
devices are marketed as in-home hubs for managing day-to-day
tasks.122 They record people’s communications, storing them as voice
recordings and text transcripts in the cloud.123 Amazon retains text
transcripts even after subscribers choose to delete the saved audio
files of their voice interactions with the device.124
   According to researchers, voice-activated assistants, such as
Alexa and Echo, do not only wake and record when subscribers say
the “wake word.”125 Indeed, the systems are error prone and have
recorded intimate conversations.126 Apple’s Siri has captured
recordings of sexual encounters.127 Computer science researchers at
Northeastern University conducted a study of smart speakers by
exposing devices to three audiobooks and nine episodes of the

   119. Emily Dreyfuss, Don’t Get Your Valentine an Internet-Connected Sex Toy, WIRED
(Feb. 14, 2019, 10:02 AM), https://www.wired.com/story/internet-connected-sex-toys-security/
[https://perma.cc/ER73-9LFK]; Rebecca “Burt” Rose, How Fit Is Your Dick, Exactly? The Sex-
Fit Ring Knows All the Answers, JEZEBEL (Aug. 8, 2014, 6:10 PM), https://jezebel.com/how-fit-
is-your-dick-exactly-the-sexfit-ring-knows-al-1618065007 [https://perma.cc/YQX8-DBMR].
   120. See IoD Goals, INTERNET OF DONGS PROJECT, https://internetofdon.gs/about/ [https://
perma.cc/F9K8-M9RC]. Security researchers involved in “The Internet of Dongs Project”
report on security vulnerabilities and work with companies interested in fixing problems. Id.
The researchers have published guidance documents on the reporting of security
vulnerabilities and ensuring secure software development lifecycle to prevent vulnerabilities
from occurring in the first place. Vendor Resources, INTERNET OF DONGS PROJECT, https://
internetofdon.gs/vendor-resources/ [https://perma.cc/SK3H-WD3T].
   121. Alex Hern, Apple Contractors ‘Regularly Hear Confidential Details’ on Siri Recordings,
GUARDIAN (July 26, 2019, 12:34 PM), https://www.theguardian.com/technology/2019/jul/26/
apple-contractors-regularly-hear-confidential-details-on-siri-recordings [https://perma.cc/
DB24-B927].
   122. Kelly & Statt, supra note 6.
   123. Id.
   124. Id.
   125. Allen St. John, Smart Speakers that Listen When They Shouldn’t, CONSUMER REPS.
(Aug. 29, 2019), https://www.consumerreports.org/smart-speakers/smart-speakers-that-listen-
when-they-shouldnt/ [https://perma.cc/WK4T-2KH4].
   126. Id.; Hern, supra note 121.
   127. Hern, supra note 121.
You can also read